Windows Hello Business support for FortiGate SAML-based IPsec VPN
For FortiGate SAML-based auto-connect IPsec VPN tunnels using Microsoft Entra ID, Windows Hello for Business (key-based or certificate-based) authentication users automatically connect to the tunnel after Windows login (using MFA with PIN or biometrics, such as fingerprint or facial recognition) without the need to re-authenticate for the VPN connection using the Entra ID username and password.
The following is an example of a FortiGate SAML-based IPsec VPN auto-connecting seamlessly using PIN or biometric Windows login via Windows Hello for Business.
Topology
FortiGate configuration
To configure a FortiGate SAML-based auto-connect IPsec VPN tunnel using Microsoft Entra ID:
config system global
set auth-ike-saml-port 1234
end
config user saml
edit "saml_azure"
set entity-id "https://fgtvms.fortinet-fsso.com:1234/remote/saml/metadata"
set single-sign-on-url "https://fgtvms.fortinet-fsso.com:1234/remote/saml/login"
set single-logout-url "https://fgtvms.fortinet-fsso.com:1234/remote/saml/logout"
set idp-entity-id "https://sts.windows.net/f1a72219-bba3-4f6e-93b8-ce3b341b7cf4/"
set idp-single-sign-on-url "https://login.microsoftonline.com/f1a72219-bba3-4f6e-93b8-ce3b341b7cf4/saml2"
set idp-single-logout-url "https://login.microsoftonline.com/f1a72219-bba3-4f6e-93b8-ce3b341b7cf4/saml2"
set idp-cert "REMOTE_Cert_1"
set user-name "http://schemas.microsoft.com/identity/claims/displayname"
set group-name "user.groups"
set digest-method sha1
next
end
config user group
edit "VPN_Group"
set member "saml_azure"
next
end
config system interface
edit "port1"
set ike-saml-server "saml_azure"
next
end
config firewall address
edit "IPsec_Tunnel_Add"
set uuid eb1ef2de-6f22-51f0-cb1c-29661de3254e
set type iprange
set start-ip 192.168.183.100
set end-ip 192.168.183.200
next
end
config vpn ipsec phase1-interface
edit "IKEV2-SAML-AZ"
set type dynamic
set interface "port1"
set ike-version 2
set peertype any
set net-device disable
set mode-cfg enable
set proposal aes128-sha256 aes256-sha256
set dpd on-idle
set comments "VPN: IKEV2_SAML_AZ (Created by VPN wizard)"
set dhgrp 5 15
set eap enable
set eap-identity send-request
set wizard-type dialup-forticlient
set reauth enable
set authusrgrp "VPN_Group"
set client-resume enable
set client-resume-interval 120
set network-overlay enable
set network-id 20
set transport udp
set assign-ip-from name
set dns-mode auto
set ipv4-name "IPsec_Tunnel_Add"
set save-password enable
set client-auto-negotiate enable
set client-keep-alive enable
set psksecret ENC zJrtRzDllMxyinqk+NaPcXu2gSVqqqQidEssBnIFrlEDjPa2tR5JRElNQ4pmJlAno1Vogwdt2S39fqyBgjbCSpp50YNFE//+g9ycAR6fukJ/93VdgYvNo48cRtK0li6gWyNn+ryF0yul88U2gMQ3+1HavwkD8Q2G73m7uj6ehKf/SRuz+j1Sddr/o8dH01TllxrJpVlmMjY3dkVA
next
end
config vpn ipsec phase2-interface
edit "IKEV2_SAML_AZ"
set phase1name "IKEV2-SAML-AZ"
set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305
set dhgrp 15
set comments "VPN: IKEV2_SAML_AZ (Created by VPN wizard)"
next
end
FortiClient EMS configuration
You must configure the FortiGate SAML-based IPsec VPN tunnel with Auto Connect enabled in the EMS XML or GUI:
-
XML:
<forticlient_configuration> <vpn> <ipsecvpn> <connections> <connection> <name>SAML_Auto_WHfB</name> <ike_settings> <version>2</version> <authentication_method>Preshared Key</authentication_method> <server>fgtvms.fortinet-fsso.com</server> <ike_saml_port>1234</ike_saml_port> </ike_settings> <sso_enabled>1</sso_enabled> </connection> </connections> </ipsecvpn> <options> <autoconnect_tunnel>SAML_Auto_WHfB</autoconnect_tunnel> </options> </vpn> </forticlient_configuration> -
GUI:
After the EMS configuration, verify that the FortiGate SAML-based IPsec VPN tunnel has been pushed to FortiClient via EMS:
Windows Hello for Business configuration
To configure Windows Hello for Business on Entra-joined devices to satisfy MFA claims for SAML SSO VPN authentication:
- Add the device to Entra ID by setting up Access work or school:

-
Follow the instruction to enter the Entra ID credential and respond the MFA verification by approving Microsoft Authenticator app, which can be installed on the smartphone.

-
Click Done in the window that confirms the device is connected to the Entra ID.
-
Verify that the device has joined the Entra ID.
- Sign in with the Entra ID account on the machine. Windows will automatically prompt to set up WHfB. Click OK.

- Go through the Microsoft Entra MFA setup as required to verify identity.

- Create a PIN as required.


-
Enable biometric sign-in (fingerprint and facial recognition) for Windows Hello for Business.
Verification
After Windows Hello for Business (WHfB) is provisioned, verify that the FortiGate SAML-based IPsec VPN auto-connects seamlessly after Windows login via Windows Hello for Business using PIN or biometrics:
-
Sign-in with PIN or biometrics (fingerprint or facial recognition):
-
Verify that the FortiGate SAML-based IPsec VPN tunnel auto-connected without user intervention.
